Configuring Multicast (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER - NSM CONFIGURATION GUIDE FOR EX SERIES DEVICES REV 3 Configuration Manual

Nsm configuration guide for ex series devices
Table of Contents

Advertisement

Configuring Multicast (NSM Procedure)

Table 38: Configuring Multicast Fields
Option
Comment
Backup Pe Group
Copyright © 2010, Juniper Networks, Inc.
You can configure generic multicast properties for routing instances. A routing instance
is a collection of routing tables, interfaces, and routing protocol parameters. The routing
protocol parameters control the information in the routing tables.
To configure generic multicast properties for routing instance in NSM:
In the navigation tree, select
1.
In the
list, double-click the device to select it.
Devices
2.
Click the
Configuration
3.
In the configuration tree, expand
4.
Select
Multicast
.
5.
Add or modify the parameters as specified in Table 38 on page 61.
6.
Click one:
7.
OK—To save the changes.
Cancel—To cancel the modifications.
Apply—To apply the routing option settings.
NOTE: After you make changes to a device configuration, you must push that
updated device configuration to the physical security device for those changes
to take effect. You can update multiple devices at one time. See the Updating
Devices section in the Network and Security Manager Administration Guide for
more information.
Function
Specifies the comment for the multicast
configuration.
Enables you to configure a backup
provider edge (PE) group for ingress PE
device redundancy when
point-to-multipoint (P2MP)
label-switched paths (LSPs) are used
for multicast distribution.
Device Manager > Devices
tab.
.
Routing Options
Your Action
Enter the comment.
1.
2. Click the New button or select a
3. Configure the PE group name, local
Chapter 7: Configuring Routing Options
.
Expand the
tree and select
Multicast
.
Backup Pe Group
group and click the Edit button.
address, and backup address.
61

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents